50th week of 2012 patent applcation highlights part 59 |
Patent application number | Title | Published |
20120317562 | Method and Apparatus for downgrading firmware in a controller - A method for downgrading firmware in a controller is provided. The method includes receiving a request, by the controller, to downgrade the firmware from a current version to an older version. For a feature implemented in the current version and not implemented in the older version, the method includes determining if the feature is currently in-use by the controller. If the feature is currently in-use by the controller, the method includes warning a user and abandoning the request. If the feature is not currently in-use by the controller, the method includes checking other features implemented in the current version and not implemented in the older version, and repeating determining, providing, abandoning, and checking, and downgrading the firmware, if all of the features implemented in the current version and not implemented in the older version are not currently in-use by the controller. | 2012-12-13 |
20120317563 | METHOD AND SYSTEM FOR CHECKING THE CONSISTENCY OF APPLICATION JAR FILES - A computer method and system dynamically provide consistency of Java application files. A processor executed routine is configured (e.g., instrumented as an agent) to intercept each class that is loaded into a subject Java application or JVM. The system computes a cyclic redundancy check (CRC) of the respective JAR file surrounding the loaded class. The system compares the computed CRC value to a CRC value of at least one other copy of the respective JAR file. Based on results of the comparison, the system determines consistency (e.g., same version) of the multiple copies of the respective JAR file used by the subject Java application. If the multiple copies of the respective JAR file are determined to be inconsistent, the system alerts the user and/or enables the application to abort. The comparative CRC value may be stored in a repository; and the step of comparing looks up the stored CRC value in the repository. | 2012-12-13 |
20120317564 | AUTOMATED MODIFICATION OF PRE-GENERATED MSI PACKAGED APPLICATIONS - Deployment packages for applications may be created automatically to deploy unique instances of an application for execution on a computer system. The deployment packages may be created by copying an original deployment package to a new deployment package and modifying properties, attributes, and/or values within the new deployment package. The modified parameters may include a globally-unique identifier (GUID). The modifications to the new deployment package may be performed automatically without access to source code for the application in the original deployment package. The new deployment package may be deployed on a computer system to install a unique instance of the application. Automatic creation of deployment packages may be useful for testing multiple copies of an application in parallel on a computer system. | 2012-12-13 |
20120317565 | METHODS AND DEVICES FOR CONTROLLING ACCESS TO COMPUTING RESOURCES - Methods and devices for controlling access to resources are disclosed herein. In one example embodiment, the method comprises: executing an application at a first computing device, wherein an attempt to access a computing resource on the computing device is made by the application; determining that the application is not configured to access the computing resource, in response to the attempt; displaying, in a user interface of the computing device, a permission request to allow the application to access the computing resource; and transmitting data from the computing device to the application server, the data notifying the application server that the attempt to access the computing resource was made by the application when the application was not configured to access the computing resource, and the data being usable by the application server to determine whether a corresponding computing resource on at least one different computing device is likely to be accessed when the application is executed on the at least one different computing device. | 2012-12-13 |
20120317566 | VIRTUAL MACHINE PACKET PROCESSING - Packet processing for packets from a virtual machine includes receiving a packet from an external switch at a computer system hosting a plurality of virtual machines. If the received packet is a learning packet, storing a packet signature determined from the learning packet. For a packet to be transmitted from a virtual machine in the computer system, determining if the packet's signature matches the stored packet signature. If the packet's signature matches the stored packet signature, performing an action associated with the packet signature. | 2012-12-13 |
20120317567 | VIRTUAL NETWORK CONFIGURATION AND MANAGEMENT - A Hardware Management Console (HMC) configures virtual networks. The HMC extends Internal Queued Direct I/O to an intra-ensemble data network (IEDN) within a cluster of virtual servers to define a single channel path identifier, and to define a channel parameter. The HMC defines at least one virtual network. The HMC defines a bridge port within each CPC that supports at least one of the virtual servers. The HMC defines a network interface for each virtual server within each cluster. The HMC grants access to a corresponding virtual network for each virtual server. | 2012-12-13 |
20120317568 | OPERATING SYSTEM DECOUPLED HETEROGENEOUS COMPUTING - A heterogeneous processing system is described herein that provides a software hypervisor to autonomously control operating system thread scheduling across big and little cores without the operating system's awareness or involvement to improve energy efficiency or meet other processing goals. The system presents a finite set of virtualized compute cores to the operating system to which the system schedules threads for execution. Subsequently, the hypervisor intelligently controls the physical assignment and selection of which core(s) execute each thread to manage energy use or other processing requirements. By using a software hypervisor to abstract the underlying big and little computer architecture, the performance and power operating differences between the cores remain opaque to the operating system. The inherent indirection also decouples the release of hardware with new capabilities from the operating system release schedule. | 2012-12-13 |
20120317569 | MULTI-DOMAIN INFORMATION SHARING - The present disclosure includes methods and systems for multi-domain information sharing. One or more embodiments can include a computing device with a VMM hosting a first information domain VM, a second information domain VM, and a cross-domain solution VM that controls information transfer between the first information domain VM and the second information domain VM. One or more embodiments can also include a hypervisor to enforce an isolation policy within the system. | 2012-12-13 |
20120317570 | SYSTEM AND METHOD FOR VIRTUAL PARTITION MONITORING - A method is provided in one example embodiment that includes receiving in an external handler an event notification associated with an event in a virtual partition. A thread in the process in the virtual partition that caused the event can be parked. Other threads and processes may be allowed to resume while a security handler evaluates the event for potential threats. A helper agent within the virtual partition may be instructed to execute a task, such as collecting and assembling event context within the virtual partition, and results based on the task can be returned to the external handler. A policy action can be taken based on the results returned by the helper agent, which may include, for example, instructing the helper agent to terminate the process that caused the event. | 2012-12-13 |
20120317571 | SUPER OPERATING SYSTEM FOR A HETEROGENEOUS COMPUTER SYSTEM - A super operating system for a heterogeneous computer system for executing tasks of software that has at least one performance processor, a processor supporting logic, and a hypervisor processor. The super operating system has a performance operating system for the performance processor; a hypervisor operating system for the hypervisor processor and a heterogeneous hypervisor software layer on top of the performance and hypervisor processors and below the performance and hypervisor operating systems. Under the super operating system, the hypervisor processor executes tasks that the hypervisor processor has sufficient processing power to handle and puts the performance processor to a power-conserving state. The hypervisor processor brings the performance processor out of power-conserving state to execute tasks that the hypervisor processor has insufficient processing power to handle. The performance and hypervisor processors simultaneously execute tasks that require combined processing power of all processors. | 2012-12-13 |
20120317572 | VIRTUALIZATION EVENT PROCESSING IN A LAYERED VIRTUALIZATION ARCHITECTURE - Embodiments of apparatuses and methods for processing virtualization events in a layered virtualization architecture are disclosed. In one embodiment, an apparatus includes a event logic and evaluation logic. The event logic is to recognize a virtualization event. The evaluation logic is to determine whether to transfer control from a child guest to a parent guest in response to the virtualization event. | 2012-12-13 |
20120317573 | DETERMING AN ALLOCATION CONFIGURATION FOR ALLOCATING VIRTUAL MACHINES TO PHYSICAL MACHINES - A computer-executable method for determining an allocation configuration for allocating virtual machines to physical machines. The method includes the steps of determining a predicted peak usage amount of physical resources for each time interval for individual clusters wherein the clusters include a plurality of virtual machines; setting a constraint that ensures the total predicted peak usage amount of the physical resource predicted for the first physical machine does not exceed the physical resource amount for the first physical machine; and deriving an allocation configuration by calculating, in accordance with the constraint, a solution to an optimization problem for minimizing, as an objective function, the sum total of the physical resource amounts of the plurality of physical machines to which the virtual machines are allocated. | 2012-12-13 |
20120317574 | METHOD FOR OPERATING AN AUTOMATION DEVICE - In a method for operating an automation device having an internal finite state machine, a mapping unit, an internal data interface operatively connected for flow of information between the internal finite state machine and the mapping unit, and the mapping unit operatively connected for flow of the same information between the internal data interface and an external data interface of a communication module, state information of the internal finite state machine is routed to the mapping unit via the internal data interface, separate state information is derived from the state information received by the mapping unit, and the mapping unit then provides the separate state information to a communication unit of the communication module. | 2012-12-13 |
20120317575 | APPORTIONING SUMMARIZED METRICS BASED ON UNSUMMARIZED METRICS IN A COMPUTING SYSTEM - A computer program product includes a computer readable storage medium containing computer code that, when executed by a computer, implements a method including receiving, by a memory device of the computing system, a log file, the log file comprising unsummarized metrics, the unsummarized metrics being related to a plurality of transactions performed by a program in the computing system, and a summarized metric, the summarized metric being related to the program, wherein the summarized metric comprises accumulated data from the plurality of transactions; selecting an unsummarized metric that reflects a distribution of the summarized metric among the plurality of transactions by a processing device of the computing system; and determining an amount of the summarized metric that belongs to a transaction of the plurality of transactions based on the selected unsummarized metric by the processing device of the computing system. | 2012-12-13 |
20120317576 | method for operating an arithmetic unit - A method for operating an arithmetic unit having at least two computation cores. One signature register which has multiple inputs is assigned in each case to at least two of the at least two computation cores. At least one task is executed by the at least two of the at least two computation cores, an algorithm is computed in each task, results computed by each computation core are written into the assigned signature register, and the results written into the signature registers are compared. | 2012-12-13 |
20120317577 | Pattern Matching Process Scheduler with Upstream Optimization - Processes in a message passing system may be launched when messages having data patterns match a function on a receiving process. The function may be identified by an execution pointer within the process. When the match occurs, the process may be added to a runnable queue, and in some embodiments, may be raised to the top of a runnable queue. When a match does not occur, the process may remain in a blocked or non-executing state. In some embodiments, a blocked process may be placed in an idle queue and may not be executed until a process scheduler determines that a message has been received that fulfills a function waiting for input. When the message fulfills the function, the process may be moved to a runnable queue. | 2012-12-13 |
20120317578 | Scheduling Execution of Complementary Jobs Based on Resource Usage - The subject disclosure is directed towards executing jobs based on resource usage. When a plurality of jobs is received, one or more jobs are mapped to one or more other jobs based on which resources are fully utilized or overloaded. The utilization of these resources by the one or more jobs complements utilization of these resources by the one or more other jobs. The resources are partitioned at one or more servers in order to efficiently execute the one or more jobs and the one or more other jobs. The resources may be partitioned equally or proportionally based on the resource usage or priorities. | 2012-12-13 |
20120317579 | SYSTEM AND METHOD FOR PERFORMING DISTRIBUTED PARALLEL PROCESSING TASKS IN A SPOT MARKET - As a result of the systems and methods described herein, an alternative MapReduce implementation is provided which monitors for impending termination notices, and allows dynamic checkpointing and storing of processed portions of a map task, such that any processing which is interrupted by large scale terminations of a plurality of computing devices—such as those resulting from spot market rate fluctuations—is preserved. | 2012-12-13 |
20120317580 | Apportioning Summarized Metrics Based on Unsummarized Metrics in a Computing System - A method for apportioning summarized metrics based on unsummarized metrics in a computing system includes receiving, by a memory device of the computing system, a log file, the log file comprising unsummarized metrics, the unsummarized metrics being related to a plurality of transactions performed by a program in the computing system, and a summarized metric, the summarized metric being related to the program, wherein the summarized metric comprises accumulated data from the plurality of transactions; selecting an unsummarized metric that reflects a distribution of the summarized metric among the plurality of transactions by a processing device of the computing system; and determining an amount of the summarized metric that belongs to a transaction of the plurality of transactions based on the selected unsummarized metric by the processing device of the computing system. | 2012-12-13 |
20120317581 | MANAGEMENT OF COPY SERVICES RELATIONSHIPS VIA POLICIES SPECIFIED ON RESOURCE GROUPS - At least one additional resource group attribute is defined to specify at least one policy prescribing a copy services relationship between two of the storage resources. Pursuant to a request to establish the copy services relationship between the two storage resources, each of the two storage resources exchange resource group labels corresponding to which of the plurality of resource groups the two storage resources are assigned, and each of the two storage resources validates the requested copy services relationship and the resource group label of an opposing one of the two storage resources against the individual ones of the at least one additional resource group attribute in the resource group object to determine if the copy services relationship may proceed. | 2012-12-13 |
20120317582 | Composite Contention Aware Task Scheduling - A mechanism is provided for composite contention aware task scheduling. The mechanism performs task scheduling with shared resources in computer systems. A task is a group of instructions. A compute task is a group of compute instructions. A memory task, also referred to as a communication task, may be a group of load/store operations, for example. The mechanism performs composite contention-aware scheduling that considers the interaction among compute tasks, communication tasks, and application threads that include compute and communication tasks. The mechanism performs a composite of memory task throttling and application thread throttling. | 2012-12-13 |
20120317583 | HIGHLY RELIABLE AND SCALABLE ARCHITECTURE FOR DATA CENTERS - The present invention provides a highly reliable and scalable architecture for data centers. Work to be performed is divided into discrete work units. The work units are maintained in a pool of work units that may be processed by any number of different servers. A server may extract an eligible work unit and attempt to process it. If the processing of the work unit succeeds, the work unit is tagged as executed and becomes ineligible for other servers. If the server fails to execute the work unit for some reason, the work unit becomes eligible again and another server may extract and execute it. A server extracts and executes work units when they have available resources. This leads to the automatic load balancing of the data center. | 2012-12-13 |
20120317584 | PROCESSING OPERATOR MESSAGE COMMANDS - A facility is provided to enable operator message commands from multiple, distinct sources to be provided to a coupling facility of a computing environment for processing. These commands are used, for instance, to perform actions on the coupling facility, and may be received from consoles coupled to the coupling facility, as well as logical partitions or other systems coupled thereto. Responsive to performing the commands, responses are returned to the initiators of the commands. | 2012-12-13 |
20120317585 | TRANSMITTING OPERATOR MESSAGE COMMANDS TO A COUPLING FACILITY - A facility is provided to enable operator message commands from multiple, distinct sources to be provided to a coupling facility of a computing environment for processing. These commands are used, for instance, to perform actions on the coupling facility, and may be received from consoles coupled to the coupling facility, as well as logical partitions or other systems coupled thereto. Responsive to performing the commands, responses are returned to the initiators of the commands. | 2012-12-13 |
20120317586 | METHODS OF REFERENCE COUNTING ACROSS MULTIPLE PROCESSES - A method for reference counting across multiple processes in a global counter. The method includes receiving a request to increment a count and add a reference to a reference list, incrementing the count and updating the reference list with the additional reference, receiving a request to decrement the count and remove a different reference from the reference list, and decrementing the count and updating the reference list by removing the difference reference. | 2012-12-13 |
20120317587 | Pattern Matching Process Scheduler in Message Passing Environment - Processes in a message passing system may be unblocked when messages having data patterns match data patterns of a function on a receiving process. When the match occurs, the process may be added to a runnable queue, and in some embodiments, may be raised to the top of a runnable queue. When a match does not occur, the process may remain in a blocked or non-executing state. In some embodiments, a blocked process may be placed in an idle queue and may not be executed until a process scheduler determines that a message has been received that fulfills a function waiting for input. When the message fulfills the function, the process may be moved to a runnable queue. | 2012-12-13 |
20120317588 | METHOD AND MESSAGE HANDLING HARDWARE STRUCTURE FOR VIRTUALIZATION AND ISOLATION OF PARTITIONS - A computer-based method configures a hardware circuit to transfer a message to a message queue in an operating system. The hardware circuit is used to transfer a message to the message queue in the operating system without requiring use of either the operating system or a hypervisor associated with the operating system. The using the hardware circuit uses a logical identifier associated with the message to select an entry in a mapping table of the hardware circuit. A value in the entry in the mapping table is used to select an entry in an action table. The entry in the action table is used to determine a tail pointer for the message queue. The hardware circuit appends the message to a location indicted by the tail pointer without requiring cycles of a hypervisor associated with the strand. | 2012-12-13 |
20120317589 | METHODS AND SYSTEMS FOR SETTING ACCESS TO A LIST OF CLASS ENTITIES - In an embodiment, a feature is an aspect of a class which represents information, data, behaviors, or capabilities encapsulated by the class. An accessing class may be given access to one or more specified features encapsulated by an accessed class, without gaining access to other features encapsulated by the accessed class. Accordingly, special access may be granted only to the behavior and data specifically designed for the accessing class, without allowing the accessing class access to all private data and behaviors of the accessed class, and without allowing all classes in a package access to the accessed class. | 2012-12-13 |
20120317590 | METHOD AND APPARATUS FOR MERGING APPLICATIONS IN A PORTABLE TERMINAL - Merger of applications in a portable terminal includes selecting a basic application and an additional application by a user; obtaining information of the additional application; and performing a function of the additional application using the basic application and using the information of the additional application. | 2012-12-13 |
20120317591 | Implementation System for Business Applications - A system for addressing incompatibility between services and applications is disclosed. The system comprises an intermediation module, a mapper module and an execution module. The intermediation module is configured to receive a first call from an application and retrieve from a directory a reference to a service associated with the application. The mapper module is configured to retrieve, from the directory, service metadata describing the service and business metadata describing business on the application. The mapper module generates a mapping table that maps the business metadata to the service metadata for providing a response to the application query. The mapper module determines if an incompatibility exists between a business requirement associated with the application and the service. The execution module selects and executes an interface of the service based on the mapping of the business metadata and the service metadata. | 2012-12-13 |
20120317592 | METHOD AND SYSTEM FOR PROVIDING ADDITIONAL INFORMATION OF CONTENTS - A method and system for providing additional information of contents to enhance quality for selecting contents by sharing previous information about the contents with one another is provided. The method comprises capturing an image of the contents and a previously defined action of a user and transmitting the capture images to a contents sever at at least one or more terminals, when the previously defined action of the user is detected while receiving the corresponding contents from the contents server and reproducing the received contents and including the capture images received from the at least one or more terminals in the additional information of the corresponding contents at the contents server. | 2012-12-13 |
20120317593 | FACT CHECKING METHOD AND SYSTEM - A fact checking system verifies the correctness of information and/or characterizes the information by comparing the information with one or more sources. The fact checking system automatically monitors, processes, fact checks information and indicates a status of the information. | 2012-12-13 |
20120317594 | METHOD AND SYSTEM FOR PROVIDING AN IMPROVED AUDIO EXPERIENCE FOR VIEWERS OF VIDEO - A method and system for enhancing audio for a viewer watching digital video with sound, such as a movie or video game. The method and system determine where in the scene ( | 2012-12-13 |
20120317595 | INTERFACING APPARATUS FOR TRANSMITTING MOVING IMAGE BETWEEN COMMUNICATION TERMINALS AND METHOD THEREOF - Apparatus and method for relaying moving images in real time using a communication terminal are provided. The apparatus for relaying the moving images in real time using the communication terminal includes a communication terminal of an information provider, configured to have functions of global positioning system, shooting moving images, and data transmission by accessing wireless Internet networks; a terminal of an information requester, configured to request moving images shot by the communication terminal of the information provider and receive moving image information on the shot moving images; and a relay server configured to provide a transmission program to the communication terminal of the information provider so as to track a location of the communication terminal and allow the information provider to transmit the moving image information in real time, and to control and guide, in real time, transmission of the moving image information between the communication terminal of the information provider and the terminal of the information requester. | 2012-12-13 |
20120317596 | METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR PROVIDING MULTIMEDIA INFORMATION SERVICES OVER A COMMUNICATION NETWORK - In a communications network, a network access point address is determined that is currently associated with at least one of a plurality of subscriber mobile devices associated with a subscription to an information service. Content associated with the information service is formatted to provide subscriber content that is configured to be used by the plurality of subscriber mobile devices. The subscriber content is broadcast from a transmitter at the determined network access point address to the at least one subscriber mobile device over a wireless network. | 2012-12-13 |
20120317597 | TERMINAL AND TELEVISION SERVICE PLAYING METHOD THEREOF - The present invention discloses a terminal and a television service playing method thereof, wherein, the method comprises the following steps: the terminal obtaining a service key from a service platform; the terminal accepting a program selection from a user; and the terminal using the obtained service key to play a program selected by the user. The present invention ensures that a valid service key has been locally stored when a user selects a program to play, thus the response speed for playing an encrypted program is accelerated, and the user experience is enhanced. | 2012-12-13 |
20120317598 | Multiple Video Content in a Composite Video Stream - A request for a first video may be received from an end user device. A video size for the requested first video may be determined. An unused onscreen location to place the requested first video, within one of a plurality of composite mosaic video streams, may be determined. The unused onscreen location may correspond to a location for insertion of video content for output to an onscreen location of an output device. Information identifying the unused onscreen location may be transmitted to a content source of the requested first video. The requested first video based upon the unused onscreen location information may be received from the content source. The requested first video then may be placed with at least one second video into a composite video stream based upon the unused onscreen location, and the composite video stream may be transmitted to the end user device. | 2012-12-13 |
20120317599 | SYSTEM AND METHOD FOR EMERGENCY COMMUNICATIONS - A system and method for sending emergency communications. An indicator of an emergency is received through a set-top box. A location associated with the emergency is determined. A message indicating the emergency and the location associated with the emergency is sent from the set-top box. | 2012-12-13 |
20120317600 | STORING CONTENT CORRESPONDING TO PROGRAMS - A broadcast receiving apparatus, a broadcast receiving method and a display apparatus are provided. A broadcast receiving apparatus connectable to a display apparatus includes a receiving unit which receives a broadcast stream, a processing unit which processes a signal so as to obtain a program usable in the broadest stream, a plurality of content items respectively corresponding to the program and content item information regarding each of the plurality of content items, a storage unit which stores the plurality of content items which are signal processed and the content item information, and the content item information includes a program identifier and at least one group identifier related to the content items. | 2012-12-13 |
20120317601 | METHOD OF TRANSMITTING AND RECEIVING BROADCAST SIGNAL AND APPARATUS FOR RECEIVING BROADCAST SIGNAL - Disclosed are a method of transmitting and receiving a broadcast signal and an apparatus for receiving the broadcast signal. In the present invention, first program table information describing a broadcasting stream, and second program table information including additional service identifier information of the multiplexed stream and third program table information describing the additional service data for the multiplexed stream are obtained. The additional service can be provided with the additional service data by using the third program table information. | 2012-12-13 |
20120317602 | Channel Navigation Techniques - Channel navigation techniques are described. In one or more implementations, a channel up or channel down command is received during output of content available via a first television channel. Responsive to this, navigation is caused to a second television channel in a list to output content available via the second television channel, the list formed to include channels that have content that is currently available and that is similar to the content that is output via the first television channel. | 2012-12-13 |
20120317603 | Methods circuits & systems for transmitting and receiving data, including video data - Disclosed are methods, circuits, apparatus, devices and systems for transmitting and receiving data, including video data. All or some portions of a video frame (i.e. video block) may be processed and/or converted into frequency domain coefficients (e.g. DCT, DFT, etc.). Some or all of the frequency domain coefficients may be encapsulated within a transmission frame (e.g. an OFDM based transmission frame) and may be transmitted to a functionally associated receiver over a transmission channel. Not all frequency coefficients may be encapsulated and transmitted, possibly due to bandwidth limitations on the transmission channel. Selection (i.e. allocation) of one or more frequency coefficients to be transmitted may be based on a Visual Quality Metric (VQM) of the associated video block, such that encapsulation and transmission preference/priority may be given to maximize the VQM of the video block. A higher video block VQM may result in a lower transmitted distortion. | 2012-12-13 |
20120317604 | RESOURCE ALLOCATION FOR VIDEO ON DEMAND - A video on demand system has a video server ( | 2012-12-13 |
20120317605 | METHOD OF STREAMING COMPRESSED DIGITAL VIDEO CONTENT OVER A NETWORK - A method of streaming content includes encapsulating and packetizing HTTP Live Streaming (HLS) content into a MPEG private data Packet Identifier (PID) at a headend of a QAM network. This data service is multiplexed with compressed digital broadcast video content to produce a MPEG transport stream for being transmitted over the network to subscribers. The HLS content is provided to the subscriber in the form of data. At the subscriber location, the MPEG transport stream is received over the QAM network with a tuner that detects HLS content available from the MPEG transport stream in a form of a MPEG private data PID of the MPEG transport stream. The HLS content is buffered from the MPEG private data PID and made available to a wireless IP client device via a local area network connection. | 2012-12-13 |
20120317606 | METHOD FOR RECEIVING A BROADCAST SIGNAL AND BROADCAST RECEIVER - A method of receiving a broadcast signal including a Non-Real-Time (NRT) service and a broadcast receiver are disclosed herein. A method of receiving a broadcast signal including an NRT service, method comprises receiving a broadcast signal including first signaling information and second signaling information, identifying the NRT service based on the first signaling information, identifying an Internet Protocol (IP) address of an NRT service signaling data based on the first signaling information and the second signaling information, receiving the NRT service signaling data by accessing the IP address, and downloading a desired NRT service based on the NRT service signaling data. | 2012-12-13 |
20120317607 | SYSTEM AND METHOD FOR DYNAMICALLY CONFIGURING A SERIAL DATA LINK IN A DISPLAY DEVICE - A technique is disclosed for dynamically reconfiguring a digital video link based on previously determined link training parameters. Reusing the previously determined link training parameters enables a no link training (NLT) protocol for quickly configuring the digital video link without the need for repeating a link training process. A display device advertises NLT capabilities information to a GPU indicating it can retain link charactristics for one or more link configurations. The GPU uses the NLT capabilities information to determine whether the display device is able to quickly transition to a specific link configuration using the NLT protocol, or to switch between configurations. The NLT capability allows a link to be advantageously quiesced and restored quickly while the GPU is transitioning in and out of power-saving sleep states, or placing the link in a more power efficient configuration, or higher-bandwidth higher-performance configuration. Additionally, the NLT capability allows a source to determine if the link configuration can be changed quickly while the display device retains the image, and thus can continue to present a constant screen for uninterrupted viewing. | 2012-12-13 |
20120317608 | NETWORK RECEIVER AND CONTROL METHOD THEREOF - A network receiver includes a first variable resistor, a second variable resistor, a first processing unit, a second processing unit and an adjusting circuit. The first variable resistor is coupled to a first transmission line via a first terminal for transmitting a first signal. The second variable resistor is coupled to a second transmission line via a second terminal for transmitting a second signal. The first processing unit is utilized for obtaining a difference according to the first signal and the second signal, and processing the difference to generate first data. The second processing unit is utilized for obtaining a summation according to the first signal and the second signal, and processing the summation to generate second data. The adjusting circuit is utilized for adjusting resistance(s) of at least one of the first variable resistor and the second variable resistor according to the first data and the second data. | 2012-12-13 |
20120317609 | METHODS AND DEVICES FOR CONTROLLING ACCESS TO A COMPUTING RESOURCE BY APPLICATIONS EXECUTABLE ON A COMPUTING DEVICE - Methods and devices for controlling access to a computing resource by applications executable on a computing device are described herein. In one example embodiment, method comprises: identifying an application category with which one or more applications executable on the computing device is associated; providing one or more rules that specify whether the one or more applications associated with the application category are permitted to access the computing resource on the computing device; and transmitting the security policy to the computing device; wherein when the security policy is enforced at the computing device, access to the computing resource by the one or more applications executable on the computing device that are associated with the application category is controlled by the one or more rules. | 2012-12-13 |
20120317610 | DYNAMICALLY DEFINING NETWORK ACCESS RULES - Systems and computer program products are provided for dynamically defining network access control rules. A placeholder for a parameter of an interface to an endpoint such as a data processing system or virtual machine may be provided in a network access control rule, instead of a static parameter. The parameter may be dynamically determined, by a firewall or a hypervisor for example, and the placeholder may be replaced with the dynamically determined parameter. | 2012-12-13 |
20120317611 | DYNAMICALLY DEFINING RULES FOR NETWORK ACCESS - Methods are provided for dynamically defining network access control rules. A placeholder for a parameter of an interface to an endpoint such as a data processing system or virtual machine may be provided in a network access control rule, instead of a static parameter. The parameter may be dynamically determined, by a firewall or a hypervisor for example, and the placeholder may be replaced with the dynamically determined parameter. | 2012-12-13 |
20120317612 | ELECTRONIC APPARATUS AND METHOD OF CONTROLLING THE SAME - In an electronic apparatus of this invention, after a security function is canceled, it is determined whether the elapsed time from cancellation of the security function to detection of attachment of a device having a security function of security level higher than that of the canceled security function or the elapsed time until the operation of the attached device is enabled has exceeded a predetermined time. Upon determining that the elapsed time has exceeded the predetermined time, the electronic apparatus enables the canceled security function again. | 2012-12-13 |
20120317613 | NETWORK APPARATUS BASED ON CONTENT NAME AND METHOD FOR PROTECTING CONTENT - A content protection method includes generating content protection information regarding a content to be protected by a content producer, and generating a content name indicating a location of the content in content name based networks based on the content protection information. The content protection information may include at least one of marking information indicating whether the content is protected and policy information indicating a disclosure range of the content. | 2012-12-13 |
20120317614 | INDEPENDENT ROLE BASED AUTHORIZATION IN BOUNDARY INTERFACE ELEMENTS - Boundary interfaces for communications networks are disclosed. An example method includes configuring, with a processor, a first policy for a first network interface of a computing device in response to an input from a first network administrator of a first network; configuring, with the processor, a second policy for a second network interface of the computing device in response to an input from a second network administrator of a second network, the second network administrator being different than the first network administrator; displaying the second policy to the first network administrator; and displaying the first policy to the second network administrator. | 2012-12-13 |
20120317615 | USE OF USER LOCATION INFORMATION FOR REMOTE ACTIONS - Architecture that provides location broker services which share the user location with other parties (e.g., based on user consent). Stationary computing devices can also determine the location of the user operator and interact accordingly. In one embodiment, the user location is retrieved from the user mobile device (e.g., smart phone) and is transmitted to other mobile or non-mobile devices with which the user interacts. Moreover, existing infrastructure and systems can be employed using a device driver that emulates the user location so that any software that uses the location services does not need modification. | 2012-12-13 |
20120317616 | NODE DEVICE AND METHOD TO PREVENT OVERFLOW OF PENDING INTEREST TABLE IN NAME BASED NETWORK SYSTEM - A node device and method are described to prevent overflow of a pending interest table (PIT). When excessive request messages are received through a particular interface, the node device and method transmits a traffic control message to control a transmission interval of the request messages, which are transmitted to a corresponding interface. | 2012-12-13 |
20120317617 | CROSS DOMAIN NOTIFICATION - A method for a mobile communication device to indicate activity associated with an operating domain includes establishing a plurality of operating domains for the mobile communication device each operating as an independent virtual machine. The method also includes providing a trusted indicator at the mobile communication device for indicating activity associated with a high-side domain. The method also includes providing an input on the mobile communication device for switching from a low-side domain to the high-side domain. The method also includes providing a trusted element for the mobile communication device that is independent of either the high-side domain or the low-side domain. The trusted element may be configured to receive a signal from the input for switching from the low-side domain to the high-side domain and to perform user authentication for switching from the low-side domain to the high-side domain. | 2012-12-13 |
20120317618 | METHOD AND SYSTEM FOR MANAGING DELAYED USER AUTHENTICATION - A system and methods for coordinating the operation of a client security module and a host security module on a mobile electronic device. The modules communicate with each other through a platform abstraction layer using application programming interfaces to coordinate their activities. In particular, on start-up of the device, the host security module obtains user authorization input from a user and passes the input to a client operating system for validation. Once validated, the host security module unlocks the host-side of the device. At the same time, the client operating system sends a notice or request to the client-side virtual machine requesting that the client-side be unlocked. Once the virtual machine is initialized and available it launches the client security module and unlocks the client-side. During the delay while the virtual machine loads, the user is given access only to the host applications. | 2012-12-13 |
20120317619 | AUTOMATED SEAMLESS RECONNECTION OF CLIENT DEVICES TO A WIRELESS NETWORK - A host device for a wireless network may be configured to implement at least two virtual access points for connecting client devices to the wireless network. A user virtual access point enables a client device to connect to the wireless network and transmit network traffic to other devices connected to the wireless network. In addition, a setup virtual access point provides an additional access point to connect to the wireless network when network credentials for the user virtual access point, such as a service set identifier (SSID) or a password, are changed by a user. When a client device cannot find the user virtual access point based on a stored SSID or password, the client device may be configured to automatically reconnect to the setup virtual access point to request a new SSID and network credentials for the user virtual access point. | 2012-12-13 |
20120317620 | Website visitor identification algorithm - An improved method for identifying and counting the unique visitors to a website, comprising the redundant storage of information about the visitor in a first-party cookie, a third-party cookie, and a Flash cookie, enabling the persistence of visitor identification even if one of the abovedescribed cookies or some information therein is deleted by the visitor or otherwise unavailable. | 2012-12-13 |
20120317621 | CLOUD SYSTEM, LICENSE MANAGEMENT METHOD FOR CLOUD SERVICE - A screen to be presented to a customer administrator is generated according to the license status. Also, as a license status, a processing progress status is provided in which the customer administrator is prohibited to perform operations during asynchronous license status change processing. | 2012-12-13 |
20120317622 | HARDWARE IDENTITY IN MULTI-FACTOR AUTHENTICATION AT THE APPLICATION LAYER - Device authentication is implemented at the application layer of a computer communication model to add a factor to user authentication without requiring any action by the user. User space applications, such as web browsers, e-mail readers, and such, can remain completely unaffected. Instead, the additional authentication factor is provided at the application layer, typically in an operating system, where protocols such as HTTP(s), FTP(s), POP, SMTP, SNMP and DNS are implemented. Authentication is performed by a challenge/response transaction and the client device's digital fingerprint is compared to a whitelist of digital fingerprints of authorized client devices. | 2012-12-13 |
20120317623 | Systems and methods for managing database authentication and sessions - Systems and methods enable remote (or “off-campus”) users complete authorized access to full-record content of 3rd-party databases subscribed to by the user's institution. More particularly, the present invention relates to a method and system that acts as a transparent conduit between the user and a remote database, managing relevant session/context information without the user's awareness and without the need for users to install plug-ins or configure browser proxies. | 2012-12-13 |
20120317624 | METHOD FOR MANAGING ACCESS TO PROTECTED RESOURCES AND DELEGATING AUTHORITY IN A COMPUTER NETWORK - In a method, a consumer ( | 2012-12-13 |
20120317625 | Dynamic Authentication in Secured Wireless Networks - Systems and methods for authentication using paired dynamic secrets in secured wireless networks are provided. Each authenticated user is assigned a random secret generated so as to be unique to the user. The secret is associated with a wireless interface belonging to the user, so that no other wireless interface may use the same secret to access the network. The secret may be updated either periodically or at the request of a network administrator, and reauthentication of the wireless network may be required. | 2012-12-13 |
20120317626 | NETWORK RESOURCE ACCESS CONTROL METHODS AND SYSTEMS USING TRANSACTIONAL ARTIFACTS - Methods and systems are provided for use with digital data processing systems to control or otherwise limit access to networked resources based, at least in part, on transactional artifacts and/or derived artifacts. | 2012-12-13 |
20120317627 | TOOL, METHOD AND APPARATUS FOR ASSESSING NETWORK SECURITY - Tools and methods in which user interaction via a common user interface enables the assessing of network security prior to implementation of the network, as well as assessing the security of existing networks, portions of existing networks, or modifications to existing networks. A network security model useful in realizing the tools and methods is also disclosed. | 2012-12-13 |
20120317628 | SYSTEMS AND METHODS FOR AUTHORIZING A TRANSACTION - Methods and apparatuses are disclosed for creating a software based secure element reader and a digital credential data delivery system for point-of-sale (POS) locations that do not have a secure element reader. Methods and apparatuses are described for creating a remotely hosted repository of secure elements that may be selected and connected to a mobile or a stationary device. Near-field communication (NFC) capabilities may be utilized to interrogate a selected secure element by a RFID POS reader through the mobile NFC device over a data connection between that mobile NFC device and the remote hosted secure element. | 2012-12-13 |
20120317629 | REVERSE MAPPING METHOD AND APPARATUS FOR FORM FILLING - In the presently preferred embodiment of the invention, every time a user submits a form the client software tries to match the submitted information with the stored profile of that user. If a match is discovered, the program tags the field of the recognized data with a corresponding type. The resulting profile can be used after that to help all subsequent users to fill the same form. | 2012-12-13 |
20120317630 | REMOTE LOGIN ARRANGEMENT FOR HETEROGENEOUS SYSTEMS USING CENTRALIZED AUTHENTICATION - Methods and systems for authenticating a remote user across heterogeneous authentication systems are disclosed. One method includes receiving domain user credentials at a first heterogeneous authentication system, and transmitting the domain user credentials from the first heterogeneous authentication system to an authentication interface associated with a second heterogeneous authentication system. The method also includes transmitting the domain user credentials from the second heterogeneous authentication system to a centralized authentication system, and receiving at the authentication interface a validation message from the centralized authentication system, thereby authenticating the user. The method further includes determining a local username at the authentication interface based on the domain user credentials. The method includes using the local username to authenticate the user within the first heterogeneous authentication system. | 2012-12-13 |
20120317631 | SYSTEM AND METHOD FOR AUTHENTICATING A USER - Provided are a system and method to authenticate user identities. The method includes gathering metadata from at least one discussion involving at least one pre-defined user identity on a first social network. The method evaluates the metadata of at least one third party response related to a posting by the at least one pre-defined user identity. The at least one pre-defined user identity is authenticated based on the evaluated third party response. And an indication of authentication for the at least one pre-defined user identity is provided. The system and method may also permit bridging of the established authentication between different social networks. | 2012-12-13 |
20120317632 | Method and Apparatus for a Token - A method and apparatus of using a token comprises receiving an indication of a presence of a nearby short-range terminal and waking up the token in response to receiving the indication. The method further comprises performing authentication between the token and the terminal, without requiring a user to directly interact with the token. | 2012-12-13 |
20120317633 | System and method to control display of a realm name - A method for dynamically assigning a displayable realm name begins upon receipt of an authentication request to an application, such as a web application, being executed by an application server. In response, a determination is made whether an application realm name has been set in a configuration file associated with the application. If not, a custom display property is then evaluated. If the custom display property is set true, a realm name associated with an active authentication mechanism is retrieved and provided for display in an authentication panel. If the custom display property is set false, a default string is provided for display in the authentication panel. In this manner, an application server administrator can control what realm name is displayed to an end user in the event an application developer has not specified the realm name in the application configuration. | 2012-12-13 |
20120317634 | Method of securely controlling a computer or microchip with a master or central controller connected by a secure control bus to networked microprocessors or cores - A method of securely controlling a computer or microchip through a private network. The computer or microchip includes a secure private unit protected by an inner hardware-based access barrier or firewall; an unprotected public unit including at least one network connection configured to connect to a network; a separate private network connection located in the secure private unit a microprocessor, core or processing unit configured for general purposes, in the unprotected public unit and separate from the access barrier or firewall; a master or central controlling device located in the secure private unit; and a secure control bus configured to connect the master or central controlling device with the microprocessor, core or processing unit. The secure control bus is isolated from input from both the network and components of the unprotected public unit. The method includes securely controlling an operation executed by the microprocessor, core or processing unit. | 2012-12-13 |
20120317635 | SYSTEM AND METHOD FOR MONITORING UNAUTHORIZED TRANSPORT OF DIGITAL CONTENT - A system for network content monitoring and control, comprising: a transport data monitor, connectable to a point in a network, for monitoring data being transported past said point, a signature extractor, associated with said transport data monitor, for extracting a derivation of said data, said derivation being indicative of content of said payload, a database of preobtained signatures of content whose movements it is desired to monitor, and a comparator for comparing said derivation with said preobtained signatures, thereby to determine whether said payload comprises any of said content whose movements it is desired to monitor. The monitoring result may be used in bandwidth control on the network to restrict transport of the content it is desired to control. | 2012-12-13 |
20120317636 | MANAGEMENT SYSTEM, MANAGEMENT METHOD AND MANAGEMENT PROGRAM FOR MANAGING INDUSTRIAL CONTROL SYSTEM - A system and method of an appropriate countermeasure at the time of anomaly. The management system for an industrial control system includes a control apparatus, a control network connected to the control apparatus, and multiple devices controlled by the control apparatus via the control network, the management system includes multiple firewall modules provided for each of control zones each controlling one part of the industrial control system, the firewall modules relaying communication between devices in the control zones and the control network; an event analyzing module collecting events from each of the multiple firewall modules and analyzing the events to detect an anomaly of each of the control zones, and a communication managing module changing a communication operation performed via the firewall module provided for the control zone where an anomaly has been detected. | 2012-12-13 |
20120317637 | COMMUNICATION BETWEEN PRIVATE NETWORK AND PUBLIC NETWORK - A first device in a private network is assigned a public network address that is shared in the private network, and a port number range that uniquely identifies the first device in the private network. The first device sends a network device an outgoing packet which is intended for a second device in the public network. The outgoing packet includes the assigned public network address as a source network address, a port number within the assigned port number range as a source port number, and a public network address of the second device as a destination network address. The packet is transmitted by the network device to the second device, according to the destination network address. | 2012-12-13 |
20120317638 | METHOD AND DEVICES FOR MANAGING PERMISSION REQUESTS TO ALLOW ACCESS TO A COMPUTING RESOURCE - Methods and devices for managing permission requests to allow access to a computing resource are disclosed herein. In one example embodiment, the method comprises: for an application to be installed on the computing device, determining an application category that the application is associated with, and retrieving a common permissions list for the application category, wherein the common permissions list identifies at least one computing resource that applications associated with the application category are configured to access; during an installation of the application on the computing device, determining one or more computing resources on the computing device that the application is configured to access when the application is executed on the computing device; determining which computing resources, of the one or more computing resources on the computing device that the application is configured to access when the application is executed on the computing device, are not identified in the common permissions list; and for each computing resource that the application is configured to access when the application is executed on the computing device that is not identified in the common permissions list, providing, in a user interface of the computing device, a permission request to allow the application to access the computing resource. | 2012-12-13 |
20120317639 | BIOMETRIC DATA SYSTEM - A biometric data system includes a biometric feature capture device, a front-end data display interface, a cloud operation system, databases, an identity code generation module, an identity code check module, and a result feedback module. The unique biometric features captured by the biometric feature capture device can be converted into a set of unique and unrepeated identity code through the information technique of the cloud operation system. The identity code serves to label a user's identity, whereby the identity code can be compared with the biometric features of the user to find whether the identity code matches the biometric features and verify the identity of the user. | 2012-12-13 |
20120317640 | VARIABLE LENGTH, MULTIDIMENSIONAL AUTHENTICATION KEYS - Provided are techniques for determining access to a secure system. A portion of an input sequence is received. A security factor of the received portion of the input sequence is determined by calculating: P(is)*P(gu), where P(is) is a probability of the input sequence being a valid password, and where P(gu) is a probability of a gesture pertaining to a user based on historical data collected from the user. It is determined whether the security factor has reached a predetermined level. In response to determining that the security factor has reached the predetermined level, access to the secure system is allowed before the entire input sequence is received. | 2012-12-13 |
20120317641 | PEER-TO-PEER (P2P) BOTNET TRACKING AT BACKBONE LEVEL - A method, computer-readable medium, and system for analyzing backbone traffic to determine compromised hosts from among hosts on a network are provided. The backbone traffic includes data flows. Each of the data flows is analyzed to determine peer-to-peer data flows from among the data flows. Each of the peer-to-peer data flows is one of the data flows having a source address and a destination address that are each unassociated with a domain name. The peer-to-peer data flows are analyzed to determine the compromised hosts from among the hosts. Each of the compromised hosts is interconnected with another of the compromised hosts via at least one of the peer-to-peer data flows. | 2012-12-13 |
20120317642 | Parallel Tracing Apparatus For Malicious Websites - An apparatus and system for scoring and grading websites and method of operation. An apparatus receives one or more Uniform Resource Identifiers (URI), requests and receives a resource such as a webpage, and observes the behaviors of a commercial browser operating within a commercial operating system over a multi-core processor having hardware containing virtualization extensions. The apparatus records and stores objects and packets captured while the browser is controlled by software received from a server accessed via the URI. | 2012-12-13 |
20120317643 | APPARATUS AND METHOD PREVENTING OVERFLOW OF PENDING INTEREST TABLE IN NAME BASED NETWORK SYSTEM - A node apparatus and method are described to prevent overflow of a pending interest table (PIT) in a name based network system. The node apparatus and method increases a number of PITs to correspond to a number of interface units so that the PITs match the interface units, respectively, and stores a request message flowing in per interface unit in the matching PITs. In addition, when a capacity used at each of the PITs exceeds a threshold, the node apparatus and method transmits a traffic control message for traffic control through respectively matching interface units to prevent overflow of the PITs. | 2012-12-13 |
20120317644 | Applying Antimalware Logic without Revealing the Antimalware Logic to Adversaries - The subject disclosure is directed towards a technology by which antimalware detection logic is maintained and operated at a backend service, with which a customer frontend machine communicates (queries) for purposes of malware detection. In this way, some antimalware techniques are maintained at the backend service rather than revealed to antimalware authors. The backend antimalware detection logic may be based upon feature selection, and may be updated rapidly, in a manner that is faster than malware authors can track. Noise may be added to the results to make it difficult for malware authors to deduce the logic behind the results. The backend may return results indicating malware or not malware, or return inconclusive results. The backend service may also detect probing-related queries that are part of an attempt to deduce the unrevealed antimalware detection logic, with noisy results returned in response and/or other actions taken to foil the attempt. | 2012-12-13 |
20120317645 | THREAT LEVEL ASSESSMENT OF APPLICATIONS - An application safety system is described herein that provides a scoring system of how dangerous an application is based on behavioral inspection of the application. Upon detecting installation of an application or first execution of the application, the application safety system performs static analysis before the new application is executed by the operating system. The system allows the user to approve running the application after displaying information about what the application does. Next, the system performs dynamic analysis as the application runs and alerts the user to any potentially harmful behavior. Over time, the system determines when the application may be acting in a manner that is out of character and informs the user. The system also allows users to restrict behavior that a particular application can perform. | 2012-12-13 |
20120317646 | VIRUS CO-PROCESSOR INSTRUCTIONS AND METHODS FOR USING SUCH - Circuits and methods for detecting, identifying and/or removing undesired content are provided. According to one embodiment, a method for virus processing is provided. A general purpose processor receives and stores a data segment to a first memory at a virtual address. The first memory contains paging data structures for translating virtual addresses to physical addresses. The general purpose processor directs a virus processing hardware accelerator to scan the data segment based on virus signatures compiled for the virus processing hardware accelerator and stored in a second memory. The first memory includes a first virus signature compiled for the general purpose processor. The virus processing hardware accelerator retrieves the data segment by accessing the first memory based on the virtual address and cached information, stored within one or more translation lookaside buffers local to the virus processing hardware accelerator, relating to most recently used entries of the paging data structures. | 2012-12-13 |
20120317647 | Automated Exploit Generation - A system and method for automatically generating exploits, such as exploits for target code, is described. In some implementations, the system received binary code and/or source code of a software applications, finds one or more exploitable bugs within the software application, and automatically generates exploits for the exploitable bugs. | 2012-12-13 |
20120317648 | SOFTWARE UTILIZATION PRIVILEGE BROKERING IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide a subscription service for documenting, verifying, administering, and auditing use of entitled software products in third-party networked computing environments (e.g., a cloud computing environment). Specifically, aspects of the invention provide an Entitlement Brokering System (EBS) (also referred to as an entitlement broker) that reduces the risk associated with clients improperly running licensed software products on their computing infrastructure, thus increasing the reliability and auditability of the software product's entitlement status and accelerating intake of new or existing clients through automation of the entitlement verification process. | 2012-12-13 |
20120317649 | SYSTEM AND METHOD FOR REMOTELY FLASHING A WIRELESS DEVICE - A system and method for flashing an electronic device. An electronic device is received for remote flashing. The electronic device is in direct communication with a remote device. The identifying information is received for the electronic device. User instructions associated with the electronic device are displayed for flashing the electronic device. The electronic device is flashed in response to the identifying information. | 2012-12-13 |
20120317650 | SYSTEM AND METHODS FOR FACILITATING SECURE COMMUNICATIONS ON A WEBSITE - A system and methods for facilitating secure communications on a website are presented. The system comprising a security server configured to receive a secure message from a creator device is disclosed. The security server encodes the received message and sends the encoded message or a representation of the encoded message for posting on the website so that one or more users of the website have the ability to request that the security server make the message available after the encoded message has been decoded. | 2012-12-13 |
20120317651 | INFORMATION TERMINAL AND INFORMATION LEAKAGE PREVENTION METHOD - An information terminal includes: a nonvolatile storage unit which stores a flag that indicates whether or not the information terminal is in a state in which information leakage should be prevented; a start control unit which starts the information terminal and manages a power source of the information terminal; a device group which operate upon starting of the information terminal; and a device operation control unit which controls operation of at least one of the device group. The device operation control unit controls the at least one device so as to suppress operation that appeals to at least one of the five senses of human being when the flag indicates the state in which information leakage should be prevented. | 2012-12-13 |
20120317652 | UNSOLICITED COOKIE ENABLED CONTEXTUAL DATA COMMUNICATIONS PLATFORM - Systems and methods for an unsolicited cookie enabled contextual data platform are provided. According to one embodiment, a mobile device is able to reconfigure a browser menu. An HTTP request is transmitted to a server device relating to a service supported by the server device. The request contains therein an unsolicited cookie including data indicative of information regarding (a) an end user of the mobile device, (b) the mobile device, (c) a location of the mobile device and/or (d) a network to which the mobile device is connected. Responsive to the request, an HTML file is received from the server device having embedded therein contextual menu information based on the service and the unsolicited cookie. The contextual menu information is extracted from the HTML file. End user interaction with the service is then customized by dynamically reconfiguring a browser menu of the mobile device based on the contextual menu information. | 2012-12-13 |
20120317653 | SYSTEM AND METHOD FOR UTILIZING CONTENT IN ACCORDANCE WITH USAGE RIGHTS - Apparatus, method, and media for utilizing content. An exemplary method comprises storing, on a removable storage device, a description structure comprising one or more usage rights, storing, on a removable storage device, content associated with the one or more usage rights, receiving a request for the content, the request corresponding to a utilization of the content, determining whether the utilization corresponds to at least one of the one or more usage rights, and utilizing the content in accordance with the at least one of the one or more usage rights that is determined to correspond to the utilization, wherein utilization of the content in accordance with the at least one of the one or more usage rights that is determined to correspond to the utilization is subject to fulfillment of a condition. | 2012-12-13 |
20120317654 | METHOD AND SYSTEM FOR SUBSCRIPTION DIGITAL RIGHTS MANAGEMENT - A system and method for managing use of items having usage rights associated therewith. The system includes an activation device adapted to issue a software package having a public and private key pair, the public key being associated with a user, a license device adapted to issue a license, a usage device adapted to receive the software package, receive the license and allow the user to access the item in accordance with the license, and a subscription managing device adapted to maintain a subscription list including the public key associated with the user. License's is issued by the license device upon verifying presence of the public key in the subscription list corresponding to requested content. | 2012-12-13 |
20120317655 | Method for Flexible Data Protection with Dynamically Authorized Data Receivers in a Content Network or in Cloud Storage and Content Delivery Services - A networking system comprising an application service that runs on a cloud infrastructure and is configured to receive dual encrypted content from a content provider and re-encrypt the dual encrypted content to enable dynamic user group control for group-based user authorization, and a cloud storage service coupled to the application service and configured to store the dual encrypted content from the content provider and the re-encrypted dual encrypted content from the application service, wherein the application service and the storage service are configured to communicate and operate with a content delivery service that uses a content delivery network (CDN) to deliver the re-encrypted content to one or more users in a group authorized by the content provider. | 2012-12-13 |
20120317656 | TWO-PARTY PRIVATE ESTIMATION OF DATASET SIMILARITY - A two-party approximation protocol is transformed into a private approximation protocol. A first input x∈{0,1, . . . , M} | 2012-12-13 |
20120317657 | DIGITAL CATALOGUE RAISONNE PLATFORM - A content management system for creating a digital catalogue raisonné includes at least one computer, a public user interface, a private catalogue raisonné manager, and a private user interface. The private catalogue raisonné manager is configured to instruct at least one object-oriented database to store first digital data for at least one artist, the first digital data including at least one of an image of an artwork of the at least one artist and a description of the artwork. The private user interface is configured to receive the first digital data, transmit information permitting a user to provide a command to the content management system to make available, at the public user interface, a public catalogue raisonné including the first digital data, and receive the command to make available the public catalogue raisonné. | 2012-12-13 |
20120317658 | SYSTEM AND METHOD FOR DISTRIBUTING DIGITAL CONTENT TO BE RENDERED IN ACCORDANCE WITH USAGE RIGHTS INFORMATION - Methods, apparatus, and media for distributing digital content to at least one recipient computing device to be rendered by the at least one recipient computing device in accordance with usage rights information. An exemplary method comprises determining, by at least one sending computing device, if the at least one recipient computing device is trusted to receive the digital content from the at least one sending computing device, sending the digital content, by the at least one sending computing device, to the at least one recipient computing device only if the at least one recipient computing device has been determined to be trusted to receive the digital content from the at least one sending computing device, and sending usage rights information indicating how the digital content may be rendered by the at least one recipient computing device, the usage rights information being enforceable by the at least on recipient computing device. | 2012-12-13 |
20120317659 | SYSTEM, APPARATUS, AND MEDIA FOR GRANTING ACCESS TO AND UTILIZING CONTENT - Apparatus, system, and media for utilizing content. An exemplary system comprises a first computing device and a second computing device, wherein the first computing device transmits a request for access to content to the second computing device, receives the content from the second computing device, and grants at least one permitted utilization of the content, and wherein the second computing device receives the request for access to content from the first computing device, determines whether the first second computing device is permitted to receive the content, grants access to the content based at least in part on the first computing device being permitted to receive the content, and transmits the content to the first computing device based at least in part on the first computing device being permitted to receive the content. | 2012-12-13 |
20120317660 | SYSTEM AND METHOD FOR UTILIZING CONTENT IN ACCORDANCE WITH USAGE RIGHTS - Apparatus, method, and media for utilizing content. An exemplary method comprises storing a description structure comprising one or more usage rights, storing content associated with the one or more usage rights, receiving a request for the content, the request corresponding to a utilization of the content, determining whether the utilization corresponds to at least one of the one or more usage rights, determining whether the computing device is an authorized device, and utilizing the content in accordance with the at least one of the one or more usage rights based at least in part on a determination that the utilization corresponds to the at least one of the one or more usage rights and a determination that the computing device is an authorized device. | 2012-12-13 |
20120317661 | TERMINAL DEVICE, SERVER DEVICE, CONTENT RECORDING CONTROL SYSTEM, RECORDING METHOD, AND RECORDING PERMISSION CONTROL METHOD - A terminal device recording content onto a recording medium device, a permission to record the content onto the recording medium device being granted by a server device, the terminal device comprising: a generation unit generating a value calculated so as to represent subject content for which permission to record is requested; an information transmission unit requesting the permission from the server device by transmitting information indicating the value generated by the generation unit to the server device; a signature reception unit receiving subject content signature data from the server device, the subject content signature data being transmitted by the server device upon granting the permission; and a recording unit recording the subject content onto the recording medium device as one of plain-text data and encrypted data, as well as the subject content signature data received by the signature reception unit. | 2012-12-13 |